. | . |
Tech titans join US cyber team to fight ransomware by AFP Staff Writers San Francisco (AFP) Aug 5, 2021 US cybersecurity officials on Thursday said Amazon, Google and Microsoft have enlisted to help them fight ransomware and defend cloud computing systems from hackers. The tech giants are among firms signed on to be part of a Joint Cyber Defense Collaborative intended to combine government and private skills and resources to fight hackers, according to the Cybersecurity and Infrastructure Security Agency (CISA). "With these extraordinarily capable partners, our initial focus will be on efforts to combat ransomware and developing a planning framework to coordinate incidents affecting cloud service providers," said CISA director Jen Easterly. US President Joe Biden last week expressed concern about the recent increase in cyberattacks, including via ransomware, which typically see hackers encrypting victims' data and then demanding money for restored access. "If we end up in a war, a real shooting war, with a major power, it's going to be as a consequence of a cyber breach," Biden said. Easterly introduced the new collaborative at a Black Hat cybersecurity conference in Las Vegas, where professionals from across the industry met to share research and innovations. "Damages from cybercrime is costing the world trillions; and ransomware has become a scourge," Easterly said in a keynote presentation at the event. "I want to focus on strengthening the government's collaboration with the private sector -- industry, academia, researchers, hackers." The new center will be involved in coordinating national cyber defense and sharing insights into threats, as well as take part in joint exercises, according to CISA. Easterly urged more computer security firms to join the collaborative effort. The list of those who have already signed on includes Amazon Web Services, AT&T, Crowdstrike, FireEye, Google and Microsoft. gc/to
Enabling Military Systems to Adapt to the Unexpected Washington DC (SPX) Aug 05, 2021 Many complex, cyber-physical military systems are designed to last for decades but their expected functionality and capabilities will likely evolve over time, prompting a need for modifications and adaptation. High Mobility Multipurpose Wheeled Vehicles (HMMWV), for example, had a design life of 15 years, but are now undergoing modernization to extend the average age of the fleet to 37+ years. At design time, these systems are built to handle a range of expected operating environments and paramete ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |